General

  • Target

    9bc55cc7eb8abf590be80206e938a9dc869b7925c69b6ac829f62166a6a1c6b5

  • Size

    3.8MB

  • Sample

    240801-2ajmhatela

  • MD5

    b321ab533438d6e97955959bcd9a7aba

  • SHA1

    ea9a6ea2d30cdea2bc3542074ac623e1da1a6fbd

  • SHA256

    9bc55cc7eb8abf590be80206e938a9dc869b7925c69b6ac829f62166a6a1c6b5

  • SHA512

    0b1fca5a4abfd7fac172e53fbc61a63b921bb6fb85e1a950b8c943f4048f69b9265e0fe6eff6aa807aadf039a302277622f4af7675feed5cf94255919d3bdb43

  • SSDEEP

    98304:NyZBF3vzpsJwNuofMQF8qDMGEk+lZQSdRq7:IprXco0QF4G7OZQS3q7

Malware Config

Targets

    • Target

      9bc55cc7eb8abf590be80206e938a9dc869b7925c69b6ac829f62166a6a1c6b5

    • Size

      3.8MB

    • MD5

      b321ab533438d6e97955959bcd9a7aba

    • SHA1

      ea9a6ea2d30cdea2bc3542074ac623e1da1a6fbd

    • SHA256

      9bc55cc7eb8abf590be80206e938a9dc869b7925c69b6ac829f62166a6a1c6b5

    • SHA512

      0b1fca5a4abfd7fac172e53fbc61a63b921bb6fb85e1a950b8c943f4048f69b9265e0fe6eff6aa807aadf039a302277622f4af7675feed5cf94255919d3bdb43

    • SSDEEP

      98304:NyZBF3vzpsJwNuofMQF8qDMGEk+lZQSdRq7:IprXco0QF4G7OZQS3q7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks